Computers and the Internet allow organizations of all sizes to reach new and larger markets, and provide efficiencies to improve productivity and the bottom line.
Organizations use computers and the Internet to varying degrees, and regardless of the level, organizations are responsible for creating an intra-culture of security to protect confidential information from cyber threats.
Protect your organization, members, and their data from ever-increasing cyber threats by following these cyber security tips, compiled by Access National Bank:
• Establish clear policies and procedures for employee use of your organization’s information technologies.
• Establish basic security practices to protect sensitive business information and communicate them regularly to employees.
• Implement technical defenses: firewalls, intrusion detection systems and Internet content filtering.
• Limit employee access to data and information, and limit authority to install software.
• Update antivirus software daily. Regularly download vendor security “patches” for all your software. such as Adobe - Reader, Flash Player; Microsoft - Word, Excel, PowerPoint; and Intuit - QuickBooks, Quicken.
• Change the manufacturer’s default passwords on all of your software.
• Monitor, log and analyze successful and attempted intrusions to your systems and networks.
• Secure your Wi-Fi networks.
• Make backup copies of business data and information.
• Control physical access to computers, laptops and network components.
• Make passwords complex. Use a combination of numbers, symbols and letters (uppercase & lowercase).
• Change passwords regularly (every 45 to 90 days).
• Do NOT give user names, passwords or other computer/website access codes to anyone.
• Do NOT open emails or attachments from strangers and refrain from clicking on links within emails even if it appears to be from a legitimate source.
• Beware of “Smishing” text based scams requesting individuals to reveal confidential business or personal account information. Never give account and credit card numbers, passwords or other sensitive information over the phone/cell in response to a text, phone call or email.